Acquiring and Analyzing App Metrics for Effective Mobile Malware Detection

被引:30
作者
Canfora, Gerardo [1 ]
Medvet, Eric [2 ]
Mercaldo, Francesco [1 ]
Visaggio, Corrado Aaron [1 ]
机构
[1] Univ Sannio, Dept Engn, Benevento, BN, Italy
[2] Univ Trieste, Dept Engn & Arch, I-34127 Trieste, Italy
来源
IWSPA'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS | 2016年
关键词
Malware; Android; Machine Learning;
D O I
10.1145/2875475.2875481
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Android malware is becoming very effective in evading detection techniques, and traditional malware detection techniques are demonstrating their weaknesses. Signature based detection shows at least two drawbacks: first, the detection is possible only after the malware has been identified, and the time needed to produce and distribute the signature provides attackers with window of opportunities for spreading the malware in the wild. For solving this problem, different approaches that try to characterize the malicious behavior through the invoked system and API calls emerged. Unfortunately, several evasion techniques have proven effective to evade detection based on system and API calls. In this paper, we propose an approach for capturing the malicious behavior in terms of device resource consumption (using a thorough set of features), which is much more difficult to camouflage. We describe a procedure, and the corresponding practical setting, for extracting those features with the aim of maximizing their discriminative power. Finally, we describe the promising results we obtained experimenting on more than 2000 applications, on which our approach exhibited an accuracy greater than 99%.
引用
收藏
页码:50 / 57
页数:8
相关论文
共 32 条
[11]   Detecting Anomalies in Embedded Computing Systems via a Novel HMM-Based Machine Learning Approach [J].
Cuzzocrea, Alfredo ;
Medvet, Eric ;
Mumolo, Enzo ;
Cecolin, Riccardo .
HYBRID ARTIFICIAL INTELLIGENT SYSTEMS (HAIS 2015), 2015, 9121 :405-415
[12]  
Deryckere T., 2008, WORLD WIR MOB MULT N, P1
[13]  
Dixon B., 2011, Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM '11, P27, DOI DOI 10.1145/2046614.2046620
[14]   TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones [J].
Enck, William ;
Gilbert, Peter ;
Han, Seungyeop ;
Tendulkar, Vasant ;
Chun, Byung-Gon ;
Cox, Landon P. ;
Jung, Jaeyeon ;
McDaniel, Patrick ;
Sheth, Anmol N. .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2014, 32 (02)
[15]  
Kim H, 2008, MOBISYS'08: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, P239
[16]  
Kwon J, 2014, IEEE CONF COMM NETW, P498, DOI 10.1109/CNS.2014.6997523
[17]  
Kwong L., 2012, DROIDSCOPE SEAMLESSL
[18]  
Li J, 2014, C IND ELECT APPL, P1739, DOI 10.1109/ICIEA.2014.6931449
[19]   Android Malware Detection Based on Static Analysis of Characteristic Tree [J].
Li, Qi ;
Li, Xiaoyu .
2015 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, 2015, :84-91
[20]   VirusMeter: Preventing Your Cellphone from Spies [J].
Liu, Lei ;
Yan, Guanhua ;
Zhang, Xinwen ;
Chen, Songqing .
RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 :244-+